Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco secure access control system 5.4.0.46.3 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2014-0668
Cross-site scripting (XSS) vulnerability in the portal in Cisco Secure Access Control System (ACS) allows remote malicious users to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCue65949.
Cisco Secure Access Control System -
890
VMScore
CVE-2014-0648
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authentication and authorization requirements, which allows remote malicious users to obtain administrative access via a request to this interface, aka Bug ID CSCud75187.
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.8
Cisco Secure Access Control System 5.3.0.40.9
Cisco Secure Access Control System 5.1.0.44.5
Cisco Secure Access Control System 5.2
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.3.0.40.1
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
801
VMScore
CVE-2014-0649
The RMI interface in Cisco Secure Access Control System (ACS) 5.x prior to 5.5 does not properly enforce authorization requirements, which allows remote authenticated users to obtain superadmin access via a request to this interface, aka Bug ID CSCud75180.
Cisco Secure Access Control System 5.4.0.46.3
Cisco Secure Access Control System 5.4.0.46.4
Cisco Secure Access Control System 5.4.0.46.5
Cisco Secure Access Control System 5.3.0.40.6
Cisco Secure Access Control System 5.3.0.40.2
Cisco Secure Access Control System 5.3.0.40.3
Cisco Secure Access Control System 5.1
Cisco Secure Access Control System 5.1.0.44
Cisco Secure Access Control System 5.2.0.26
Cisco Secure Access Control System 5.2.0.26.1
Cisco Secure Access Control System 5.3.0.40.7
Cisco Secure Access Control System 5.1.0.44.3
Cisco Secure Access Control System 5.1.0.44.4
Cisco Secure Access Control System 5.4.0.46.1
Cisco Secure Access Control System 5.4.0.46.2
Cisco Secure Access Control System 5.3.0.40.4
Cisco Secure Access Control System 5.3.0.40.5
Cisco Secure Access Control System 5.1.0.44.1
Cisco Secure Access Control System 5.1.0.44.2
Cisco Secure Access Control System 5.2.0.26.2
Cisco Secure Access Control System
Cisco Secure Access Control System 5.3.0.40.1
1 Article
445
VMScore
CVE-2013-5536
Cisco Secure Access Control System (ACS) does not properly implement an incoming-packet firewall rule, which allows remote malicious users to cause a denial of service (process crash) via a flood of crafted packets, aka Bug ID CSCui51521.
Cisco Secure Access Control System -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started